Data Leakage/Misuse Scenarios

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

Data leakage incidents can be characterized based on the following attributes: where the leakage occurred, who caused the leakage, what was leaked (data state), how was access to the data gained, and how did the data leak. These parameters affect decision making for data-leakage defense measures.

Original languageEnglish
Title of host publicationSpringerBriefs in Computer Science
PublisherSpringer
Pages39-46
Number of pages8
Edition9781461420521
DOIs
StatePublished - 1 Jan 2012

Publication series

NameSpringerBriefs in Computer Science
Number9781461420521
Volume0
ISSN (Print)2191-5768
ISSN (Electronic)2191-5776

ASJC Scopus subject areas

  • Computer Science (all)

Fingerprint

Dive into the research topics of 'Data Leakage/Misuse Scenarios'. Together they form a unique fingerprint.

Cite this